How To Not Be A Victim Of Ransomware The thoughtful integration of - - PowerPoint PPT Presentation
How To Not Be A Victim Of Ransomware The thoughtful integration of - - PowerPoint PPT Presentation
How To Not Be A Victim Of Ransomware The thoughtful integration of healthcare and technology How Healthcare IT Differs From General IT Agenda The Growing Threat of Ransomware What You Can Do Today To Protect Your Business How Healthcare IT
Agenda
How Healthcare IT Differs From General IT The Growing Threat of Ransomware What You Can Do Today To Protect Your Business
How Healthcare IT Differs From General IT
- Mobile Providers
- Labor Intensive + Technology Dependent
- ePHI: Top Target For Cyber Criminals
- Heavily Regulated
- Over 40% of breaches caused by
Business Associates
The Growing Threat of Ransomware
Cybersecurity threats
Ransomware’s Growing Threat to Small Businesses
The Ponemon Institute reported that:
- f SMBs were victims of a
cybersecurity attack in 2016. Data breach costs now averages per healthcare record.
The Wall Street Journal, reported that:
- f ransomware victims pay to
regain their data.
were not able to fully restore their company’s computer data.
LESS THAN 1 IN 3 ATTACKS ARE REPORTED TO THE AUTHORITIES,
A MARKED IMPROVEMENT FROM 1 IN 4 ATTACKS REPORTED IN 2016.
MORE RANSOMWARE ATTACKSREPORTED TO AUTHORITIES BYSMBs
The bad actors are not a monolithic group
Tools, techniques, motivations, and business models vary by cybercriminal region
Non-Professional
- Non-professional
cybercriminals
- Use crime kits to make
spendingmoney
- Little to no business or
technical expertise
- Even though they are not
professional, their impact can be significant
Blackhats
- Treat cybercrime as a
business
- Business and technical
expertise
- Often work in a closed group
- f other professional
cybercriminals
- Criminal reputation is
everything
Grayhats
- They believe they are
- ffering legitimate services.
However, their customers can be both “legitimate” or criminal
- Ran as a business
Hactivists
- Individuals or groups who
hack for a social cause, without economic motivation
- Have both technical
people and followers
State Sponsored
- National security and/or
economic motivation
- Technical expertise
- Work in a closed group of
- ther professionals
- Often use Blackhatresources
and/or techniques to mask their identity
Often defenders treat all bad actors the same
Cybercrime as a Service (CaaS)
It has never been easier for new entrants into the market Example of crimekits and services
“Everything that was lost is gone,” the chief said. “Our automatic backup started after the infection, so it just backed up infected files.”
Kentucky Methodist Hospital, Chino Valley Medical Center Desert Valley Hospital, California, Hollywood Presbyterian Medical Center MedStar Health, Maryland/Washington, DC
Sample Spear Phishing Attack
Cybercrime Crosses Into The Physical World
- Social engineering is being combined with cyber
attacks to increase effectiveness.
- In many regions, it is becoming socially
acceptable to steal from victims on the Internet
and scales down to Small Businesses and Consumers
TOTAL RANSOM PAID BYSMBs TO RANSOMWARE HACKERS*:
$301 MILLION.
$100-500 $501-2,000 $2,001-5,000 5,001-10,000 $10,001-15,000 $15,001-20,000 $20,001+
25% 17% 7%
47%
report the ransom requested is TYPICALLY between $500 AND $2,000.
*Between Q2 2016 and Q2 2017
FOR SMBs…THE RANSOM ISN’T WHAT BREAKS THE BANK
Q: If ransom was requested, how much (on average)? 2% 1% 1%
OF THOSE THAT PAID THE RANSOM,
15% NEVER
RECOVERED THE DATA.
2016: 2017:
41% 35%
GEO TREND: In the UK alone, 21% of SMBs who paid the ransom never recovered the data.
LESS SMBsARE PAYING CYBER CRIMINALS THE RANSOM
IN 2017,
35% REPORT
SMBs PAID THE RANSOM,
WHICH IS SIGNIFICANTLY LESS THAN IN 2016.
How much did it cost…
They did NOT pay the $73k in ransom because they had proper backups However….They did NOT have a continuity solution
- Down 2 days (Friday & Saturday)
- 735,000 rides a day offered for free
- $2.25 per ride
Lost $3.3 million
What You Can Do Today To Protect Your Business
25 Most Common Passwords of Last Year
#1 -> 123456 #6 -> 1234567890 #11 -> qwertyuiop #16 -> 7777777 #21 -> google #2 -> 123456789 #7 -> 1234567 #12 -> mynoob #17 -> 1q2w3e4r #22 -> 1q2w3e4r5t #3 -> qwerty #8 -> password #13 -> 123321 #18 -> 654321 #23 -> 123qwe #4 -> 12345678 #9 -> 123123 #14 -> 666666 #19 -> 555555 #24 -> zxcvbnm #5 -> 111111 #10 -> 987654321 #15 -> 18atcskd2w #20 -> 3rjs1la7qe #25 -> 1q2w3e
15 Ways To Protect Your Business Guide
Next Steps
- 1. Versioned Offsite Backup
- 2. Train Your Staff
- 3. Get Advanced Email Threat Protection
Free $1,500 Ransomware Protection Program 30% Off Our Risk Analysis 15 Ways To Protect Your Business from Ransomware US Medical IT Health IT Check
Do you have onsite data that is either not being backed up or that may be getting backed up but with outdated technology? Microsoft Sponsorship: $1,500 Only 5 Slots Available
www.usmedicalit.com/protect
The Protecon Package
Thank You
www.usmedicalit.com